Security news

Security

Police are probing apparent cyber vandalism on Wi-Fi networks at UK train stations

U.K. transport officials and police said Thursday they are investigating a "cyber-security incident" after users of public Wi-Fi networks at the country's biggest railway stations reported being shown anti-Muslim messages.

Security

AI is fueling a deepfake porn crisis in South Korea. What's behind it—and how can it be fixed?

It's difficult to talk about artificial intelligence without talking about deepfake porn—a harmful AI byproduct that has been used to target everyone from Taylor Swift to Australian school girls.

Security

How did they get my data? I uncovered the hidden web of networks behind telemarketers

Last year, I started getting a lot of unsolicited phone calls, mainly from people trying to sell me things. This came as a surprise because, as a data scientist, I am very careful about what personal information I let out ...

Business

Ukraine bans Telegram messenger app on state-issued devices because of Russian security threat

Ukraine has banned government officials, military personnel and other defense and critical infrastructure workers from installing the popular Telegram messaging app on state-issued devices, describing the move as necessary ...

Security

Encrypted 'Ghost' app: What we know

Police revealed Tuesday they had infiltrated and taken down an encrypted chat app called Ghost used by criminals across the world.

Security

'Good complexity' can make hospital networks more cybersecure

In May, a major cyberattack disabled clinical operations for nearly a month at Ascension, a health care provider that includes 140 hospitals across the U.S. Investigators tracked the problem to malicious ransomware that had ...

Security

New tools use AI 'fingerprints' to detect altered photos, videos

As artificial intelligence networks become more skilled and easier to access, digitally manipulated "deepfake" photos and videos are increasingly difficult to detect. New research led by Binghamton University, State University ...

Software

Usable data hacked from air-gapped computer

A team of software and information systems engineers at Ben-Gurion University of the Negev, in Israel, has demonstrated an ability to extract useful data from an air-gapped computer. The group has posted a paper to the arXiv ...

Security

Five notorious cyberattacks that targeted governments

Warfare is no longer confined to physical battlefields. In the digital age, a new front has emerged—cyberspace. Here, countries clash not with bullets and bombs, but with lines of code and sophisticated malware.

Security

Cyber attack causes chaos in Costa Rica government systems

Nearly a week into a ransomware attack that has crippled Costa Rican government computer systems, the country refused to pay a ransom as it struggled to implement workarounds and braced itself as hackers began publishing ...

Internet

Lessons from France on the regulation of internet pornography

A new study by City's honorary senior research fellow, Professor Neil Thurman, shows displacement effects, circumvention, and legislative scope may limit the efficacy of French attempts to prevent those under 18 accessing ...

Security

House panels probe gov't use of facial recognition software

Two House committees have launched an investigation into the government's use of facial recognition software that was most recently used by the Internal Revenue Service, but stopped after complaints from lawmakers and privacy ...

Security

US agencies: Industrial control system malware discovered

Multiple U.S. government agencies issued a joint alert Wednesday warning of the discovery of a suite of malicious cyber tools created by unnamed advanced threat actors that are capable of sabotaging the energy sector and ...

Security

Global operation takes down hackers' leaked data market

Western law enforcement agencies have dismantled an online marketplace used to buy and sell hacked and stolen personal data belonging to millions of people, and have brought criminal charges against the platform's founder ...

Computer Sciences

Cloud server leasing can leave sensitive data up for grabs

Renting space and IP addresses on a public server has become standard business practice, but according to a team of Penn State computer scientists, current industry practices can lead to "cloud squatting," which can create ...

Business

Mismanaged cloud services put user data at risk

Organizations' failure to properly manage the servers they lease from cloud service providers can allow attackers to receive private data, research my colleagues and I conducted has shown.